Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200052-11.doi: 10.11896/jsjkx.240200052
• Information Security • Previous Articles Next Articles
GU Zhaojun1, YANG Wen1,2, SUI He1,3, LI Zhiping1
CLC Number:
[1]YANG Y,HUANG C,ZHANG H,et al.Research on airspace security risk assessment technology based on knowledge Graph[C]//2021 IEEE 21st International Conference on Software Quality,Reliability and Security Companion(QRS-C).IEEE,2021:980-986. [2]MH/T 0076-2020,Basic requirements for Grade protection ofcivil aviation network security[S].2020. [3]DAVE G,CHOUDHARY G,SIHAG V,et al.Cyber security challenges in aviation communication,navigation,and surveillance[J].Computers & Security,2022,112:102516. [4]UKWANDU E,BEN-FARAH M A,HINDY H,et al.Cyber-se-curity challenges in aviation industry:A review of current and future trends[J].Information,2022,13(3):146. [5]ROY S,TAMIMI A,HAHNA,et al.A modeling framework for assessing cyber disruptions and attacks to the national airspace system[C]//2018 AIAA Modeling and Simulation Technologies Conference.2018. [6]LU X,WU Z,WU Y,et al.Atmchain:Blockchain-based solution to security problems in air traffic management[C]//2021 IEEE/AIAA 40th Digital Avionics Systems Conference(DASC).IEEE,2021:1-8. [7]JIA Y,QI Y,SHANG H,et al.A practical approach to constructing a knowledge graph for cybersecurity[J].Engineering,2018,4(1):53-60. [8]WANG Y,LI Y,CHEN X,et al.Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge Graphs[C]//2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom).Guangzhou,China,2020:1727-1732. [9]CHOWDHARY A,HUANG D,MAHENDRAN J S,et al.Autonomous security analysis and penetration testing[C]//2020 16th International Conference on Mobility,Sensing and Networking(MSN).IEEE,2020:508-515. [10]SUN L,LI Z,XIE L,et al.APTKG:Constructing Threat Intelligence Knowledge Graph from Open-Source APT Reports Based on Deep Learning[C]//2022 5th International Conference on Data Science and Information Technology(DSIT).IEEE,2022:1-6. [11]PANG T Y,SONG Y,SHEN Q J.Research on security threat assessment for power iot terminal based on knowledge graph[C]//2021 IEEE 5th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2021,5:1717-1721. [12]KIESLING E,EKELHART A,KURNIAWAN K,et al.TheSEPSES knowledge graph:an integrated resource for cybersecurity[C]//The Semantic Web-ISWC 2019:18th International Semantic Web Conference,Auckland,New Zealand,Part II 18.Springer International Publishing,2019:198-214. [13]REN Y,XIAO Y,ZHOU Y,et al.CSKG4APT:A CybersecurityKnowledge Graph for Advanced Persistent Threat Organization Attribution[J].IEEE Transactions on Knowledge and Data Engineering,2022,35(6):5695-5709. [14]WANG S,WANG J H,TANG G G M,et al.An Intelligent andEfficient Method for Generating Optimal permeation Path[J].Journal of Computer Research and Development,2019,56(5):929-941. [15]WU S,ZHANG Y,CAO W.Network security assessment using a semantic reasoning and graph based approach[J].Computers &Electrical Engineering,2017,64:96-109. [16]LIU C,WANG B,WANG Z,et al.TCFLTformer:TextCNN-Flat-Lattice Transformer for Entity Recognition of Air Traffic Management Cyber Threat Knowledge Graphs[J].Aerospace,2023,10(8):697. [17]KAWANISHI Y,NISHIHARA H,YOSHIDA H,et al.A Study on Threat Analysis and Risk Assessment Based on the “Asset Container” Method and CWSS[J].IEEE Access,2023,11:18148-18156. [18]UR-REHMAN A,GONDAL I,KAMRUZZAMAN J,et al.Vulnerability modelling for hybrid industrial control system networks[J].Journal of Grid Computing,2020,18:863-878. [19]ELMARADY A A,RAHOUMA K.Studying cybersecurity in civil aviation,including developing and applying aviation cybersecurity risk assessment[J].IEEE Access,2021,9:143997-144016. [20]XIE Y,GARDI A,SABATINI R.Cybersecurity Trends in Low-Altitude Air Traffic Management[C]//2022 IEEE/AIAA 41st Digital Avionics Systems Conference(DASC).IEEE,2022:1-9. [21]STROHMEIER M,TRESOLDI G,GRANGER L,et al.Building an avionics laboratory for cybersecurity testing[C]//Proceedings of the 15th Workshop on Cyber Security Experimentation and Test.2022:10-18. [22]WU Z,DONG R,WANG P.Research on Game Theory of Air Traffic Management Cyber Physical System Security[J].Aerospace,2022,9(8):397. [23]SHEN G,WANG W,MU Q,et al.Data-driven cybersecurityknowledge graph construction for industrial control system security[J].Wireless Communications and Mobile Computing,2020,2020:1-13. [24]GAMBARELLI G,GANGEMI A.PRIVAFRAME:A Frame-Based Knowledge Graph for Sensitive Personal Data[J].Big Data and Cognitive Computing,2022,6(3):90. [25]HOU S,CHEN X,MA J,et al.An Ontology-Based Dynamic Attack Graph Generation Approach for the Internet of Vehicles[J].Frontiers in Energy Research,2022,10:808. [26]ABRAHAM S,NAIR S.A predictive framework for cyber security analytics using attack graphs[J].arXiv:1502.01240,2015. [27]ZHANG K,LIU J J.A threat path generation Method based on Knowledge Graph[J].Computer Simulation,2022,39(4):350-356. [28]CHEN Y,LIU J,XIAN M,et al.Construction of network securi-ty domain knowledge graph for network attack detection[C]//Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering.2022:1171-1178. |
[1] | NIU Guanglin, LIN Zhen. Survey of Knowledge Graph Representation Learning for Relation Feature Modeling [J]. Computer Science, 2024, 51(9): 182-195. |
[2] | CHEN Shanshan, YAO Subin. Study on Recommendation Algorithms Based on Knowledge Graph and Neighbor PerceptionAttention Mechanism [J]. Computer Science, 2024, 51(8): 313-323. |
[3] | ZHANG Hui, ZHANG Xiaoxiong, DING Kun, LIU Shanshan. Device Fault Inference and Prediction Method Based on Dynamic Graph Representation [J]. Computer Science, 2024, 51(7): 310-318. |
[4] | PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5. |
[5] | HE Jing, ZHAO Rui, ZHANG Hengshuo. Visual Bibliometric Analysis of Knowledge Graph [J]. Computer Science, 2024, 51(6A): 230500123-10. |
[6] | TANG Xin, SUN Yufei, WANG Yujue, SHI Min, ZHU Dengming. Three Layer Knowledge Graph Architecture for Industrial Digital Twins [J]. Computer Science, 2024, 51(6A): 230400153-6. |
[7] | ZHU Yuliang, LIU Juntao, RAO Ziyun, ZHANG Yi, CAO Wanhua. Knowledge Reasoning Model Combining HousE with Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600209-8. |
[8] | SUN Shounan, WANG Jingbin, WU Renfei, YOU Changkai, KE Xifan, HUANG Hao. TMGAT:Graph Attention Network with Type Matching Constraint [J]. Computer Science, 2024, 51(3): 235-243. |
[9] | ZHOU Honglin, SONG Huazhu, ZHANG Juan. Knowledge Graph Embedding Model with Entity Description on Cement Manufacturing Domain [J]. Computer Science, 2024, 51(3): 251-256. |
[10] | ZOU Chunling, ZHU Zhengzhou. Fusion Model of Housekeeping Service Course Recommendation Based on Knowledge Graph [J]. Computer Science, 2024, 51(2): 47-54. |
[11] | XU Tianyue, LIU Xianhui, ZHAO Weidong. Knowledge Graph and User Interest Based Recommendation Algorithm [J]. Computer Science, 2024, 51(2): 55-62. |
[12] | HAN Yijian, WANG Baohui. Study on DistMult Decoder in Knowledge Graph Entity Relationship Prediction [J]. Computer Science, 2024, 51(11A): 231200118-5. |
[13] | WANG Yuhan, MA Fuyuan, WANG Ying. Construction of Fine-grained Medical Knowledge Graph Based on Deep Learning [J]. Computer Science, 2024, 51(11A): 230900157-7. |
[14] | ZHANG Yinling, SHANG Tao, LI Zhaokun. Radar Emitter Target Dynamic Threat Assessment Based on Combining Weighting-TOPSIS Method [J]. Computer Science, 2024, 51(11A): 231000038-7. |
[15] | ZHAO Weidong, JIN Yanfeng, ZHANG Rui, LIN Yanzheng. KBQA Algorithm Introducing Core Entity Attention Evaluation [J]. Computer Science, 2024, 51(11): 239-247. |
|